Sciweavers

807 search results - page 127 / 162
» Term Rewriting for Access Control
Sort
View
WISEC
2010
ACM
13 years 11 months ago
Attacks on physical-layer identification
Physical-layer identification of wireless devices, commonly referred to as Radio Frequency (RF) fingerprinting, is the process of identifying a device based on transmission imperf...
Boris Danev, Heinrich Luecken, Srdjan Capkun, Kari...
JSAC
2006
143views more  JSAC 2006»
13 years 10 months ago
Capacity and QoS for a Scalable Ring-Based Wireless Mesh Network
The wireless mesh network (WMN) is an economical solution to support ubiquitous broadband services. This paper investigates the tradeoffs among quality-of-service (QoS), capacity, ...
Jane-Hwa Huang, Li-Chun Wang, Chung-Ju Chang
IJIEM
2007
113views more  IJIEM 2007»
13 years 10 months ago
Fairness concerns in digital right management models
: Digital piracy is threatening the global multimedia content industry and blindly applied coercive Digital Right Management (DRM) policies do nothing but legitimizing this piracy....
Luc Bouganim, Philippe Pucheral
JCP
2007
153views more  JCP 2007»
13 years 10 months ago
An Integrated Educational Platform Implementing Real, Remote Lab-Experiments for Electrical Engineering Courses
—This paper describes an Internet-based laboratory, named Remote Monitored and Controlled Laboratory (RMCLab) developed at University of Patras, Greece, for electrical engineerin...
Dimitris Karadimas, Kostas Efstathiou
TSMC
2008
162views more  TSMC 2008»
13 years 10 months ago
A New Model for Secure Dissemination of XML Content
Abstract--The paper proposes an approach to content dissemination that exploits the structural properties of an Extensible Markup Language (XML) document object model in order to p...
Ashish Kundu, Elisa Bertino